exploitdb
WORKING POC
by Padsala Trushal · pythonwebappsphp
https://www.exploit-db.com/exploits/50477
This exploit leverages a command injection vulnerability in Fuel CMS 1.4.1 via the 'filter' parameter in the pages/select endpoint. It allows remote code execution by injecting system commands through URL-encoded payloads.
Classification
Working Poc 95%
Target:
Fuel CMS <= 1.4.1
No auth needed
Prerequisites:
Target running Fuel CMS <= 1.4.1 · Network access to the target
exploitdb
WORKING POC
by Alexandre ZANNI · rubywebappsphp
https://www.exploit-db.com/exploits/49487
This Ruby script exploits CVE-2018-16763, a remote code execution vulnerability in Fuel CMS 1.4.1. It leverages a command injection flaw in the 'pages/select' endpoint by manipulating the 'filter' parameter to execute arbitrary system commands.
Classification
Working Poc 95%
Target:
Fuel CMS <= 1.4.1
No auth needed
Prerequisites:
Network access to the target Fuel CMS instance · Fuel CMS version <= 1.4.1
exploitdb
WORKING POC
by 0xd0ff9 · pythonwebappslinux
https://www.exploit-db.com/exploits/47138
This exploit leverages a command injection vulnerability in Fuel CMS 1.4.1 via the 'filter' parameter in the pages/select endpoint. The payload is URL-encoded and injected into a system command, allowing arbitrary command execution.
Classification
Working Poc 95%
Target:
Fuel CMS <= 1.4.1
No auth needed
Prerequisites:
Target running Fuel CMS <= 1.4.1 with exposed /fuel/pages/select endpoint
nomisec
WORKING POC
23 stars
by p0dalirius · remote
https://github.com/p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE
This repository contains a functional exploit for CVE-2018-16763, targeting FuelCMS <= 1.4.1. It leverages a PHP code injection vulnerability in the `filter` parameter to upload a webshell, enabling remote command execution and file download capabilities.
Classification
Working Poc 100%
Target:
FuelCMS <= 1.4.1
No auth needed
Prerequisites:
Network access to the FuelCMS instance · FuelCMS version <= 1.4.1
nomisec
WORKING POC
5 stars
by padsalatushal · remote
https://github.com/padsalatushal/CVE-2018-16763
This repository contains a functional exploit for CVE-2018-16763, targeting Fuel CMS 1.4.1. The exploit leverages PHP code evaluation via the pages/select/ filter parameter to achieve pre-authentication remote code execution (RCE).
Classification
Working Poc 95%
Target:
Fuel CMS <= 1.4.1
No auth needed
Prerequisites:
Target running Fuel CMS <= 1.4.1 · Network access to the target
nomisec
WORKING POC
4 stars
by n3m1sys · poc
https://github.com/n3m1sys/CVE-2018-16763-Exploit-Python3
This is a Python 3 port of the original CVE-2018-16763 exploit for FuelCMS 1.4.1, which allows unauthenticated remote code execution via a crafted URL parameter. The exploit leverages a command injection vulnerability in the 'filter' parameter of the FuelCMS pages module.
Classification
Working Poc 95%
Target:
FuelCMS <= 1.4.1
No auth needed
Prerequisites:
Target URL must be running FuelCMS <= 1.4.1 · Network access to the target
nomisec
WORKING POC
3 stars
by shoamshilo · remote
https://github.com/shoamshilo/Fuel-CMS-Remote-Code-Execution-1.4--RCE--
This exploit leverages a command injection vulnerability in Fuel CMS <= 1.4.1 via the 'filter' parameter in the '/fuel/pages/select/' endpoint. The payload is URL-encoded and executed via PHP's system function.
Classification
Working Poc 95%
Target:
Fuel CMS <= 1.4.1
No auth needed
Prerequisites:
Target must be running Fuel CMS <= 1.4.1 · Remote access to the '/fuel/pages/select/' endpoint
nomisec
WORKING POC
2 stars
by h3x0v3rl0rd · poc
https://github.com/h3x0v3rl0rd/CVE-2018-16763
This Python3 script exploits CVE-2018-16763, a remote code execution vulnerability in Fuel CMS 1.4.1. It leverages a command injection flaw in the 'filter' parameter of the pages/select endpoint to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Fuel CMS 1.4.1
No auth needed
Prerequisites:
Target must be running Fuel CMS 1.4.1 · Network access to the target web application
nomisec
WORKING POC
2 stars
by not1cyyy · remote
https://github.com/not1cyyy/CVE-2018-16763
This is a functional exploit for CVE-2018-16763, targeting FuelCMS 1.4.1 and earlier. It leverages a remote code execution vulnerability via a crafted HTTP request to execute arbitrary commands on the target system, including a reverse shell option.
Classification
Working Poc 95%
Target:
FuelCMS <= 1.4.1
No auth needed
Prerequisites:
Network access to the FuelCMS application · FuelCMS version <= 1.4.1
nomisec
WORKING POC
2 stars
by kxisxr · remote
https://github.com/kxisxr/Bash-Script-CVE-2018-16763
This is a functional exploit for CVE-2018-16763, a pre-authentication remote code execution vulnerability in FuelCMS 1.4. It leverages a command injection flaw in the 'filter' parameter of the 'pages/select' endpoint to execute arbitrary system commands.
Classification
Working Poc 95%
Target:
FuelCMS 1.4
No auth needed
Prerequisites:
Target URL with vulnerable FuelCMS instance · Network access to the target
nomisec
WORKING POC
2 stars
by hikarihacks · remote
https://github.com/hikarihacks/CVE-2018-16763-exploit
This is a Python 3 exploit for CVE-2018-16763, targeting FuelCMS 1.4.1. It leverages a command injection vulnerability in the 'filter' parameter of the 'pages/select' endpoint to execute arbitrary system commands.
Classification
Working Poc 95%
Target:
FuelCMS 1.4.1
No auth needed
Prerequisites:
Target must be running FuelCMS 1.4.1 · Network access to the FuelCMS instance
nomisec
WORKING POC
1 stars
by kaxm23 · remote
https://github.com/kaxm23/exploit_cms_fuel
This is a functional Python 3 exploit for CVE-2018-16763, targeting Fuel CMS 1.4.1. It leverages insufficient input validation in the `filter` parameter to achieve pre-authentication remote code execution via PHP code evaluation.
Classification
Working Poc 95%
Target:
Fuel CMS <= 1.4.1
No auth needed
Prerequisites:
Python 3.x · requests library · network access to target · listener for reverse shell
nomisec
WORKING POC
1 stars
by dinhbaouit · remote
https://github.com/dinhbaouit/CVE-2018-16763
This exploit leverages a pre-authentication remote code execution vulnerability in FUEL CMS 1.4.1 via a crafted filter parameter in the pages/select endpoint. The PoC sends arbitrary commands encoded in the URL and extracts the output by parsing the server's response.
Classification
Working Poc 95%
Target:
FUEL CMS 1.4.1
No auth needed
Prerequisites:
Target running FUEL CMS 1.4.1 · Network access to the target
nomisec
WORKING POC
by estebanzarate · poc
https://github.com/estebanzarate/CVE-2018-16763-Fuel-CMS-1.4.1-Remote-Code-Execution-PoC
This repository contains a functional Python exploit for CVE-2018-16763, an unauthenticated RCE vulnerability in Fuel CMS 1.4.1. The exploit leverages a crafted `filter` parameter in the `/fuel/pages/select/` endpoint to execute arbitrary commands via PHP's `eval()` function, with output reflected in the HTTP response.
Classification
Working Poc 100%
Target:
Fuel CMS 1.4.1
No auth needed
Prerequisites:
Target running Fuel CMS 1.4.1 · Network access to the target
github
WRITEUP
by Zahid-secure · poc
https://github.com/Zahid-secure/cve-walkthrough-labs/tree/main/2018/CVE-2018-16763-ignite-fuelcms
This is a detailed technical walkthrough of CVE-2018-16763, a pre-auth RCE vulnerability in Fuel CMS 1.4.1. It includes root cause analysis, exploitation steps, and privilege escalation techniques.
Classification
Writeup 100%
Target:
Fuel CMS 1.4.1
No auth needed
Prerequisites:
Network access to target · Python for exploit execution · Netcat for reverse shell
gitlab
WORKING POC
by uwueviee · remote
https://gitlab.com/uwueviee/fu3lf1lt3r
This repository contains a functional Rust implementation of an exploit for CVE-2018-16763, which targets a command injection vulnerability in Fuel CMS. The exploit allows for remote code execution (RCE) by crafting malicious requests to the vulnerable endpoint.
Classification
Working Poc 95%
Target:
Fuel CMS (versions affected by CVE-2018-16763)
No auth needed
Prerequisites:
network access to the target Fuel CMS instance
gitlab
WORKING POC
by python-projects7372210 · poc
https://gitlab.com/python-projects7372210/cve-2018-16763-proof-of-concept
This repository contains a functional Python exploit for CVE-2018-16763, a pre-authenticated remote code execution vulnerability in Fuel CMS 1.4.1. The exploit leverages PHP code evaluation via the `pages/select/filter` parameter to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Fuel CMS 1.4.1
No auth needed
Prerequisites:
Python 3 · requests library · vulnerable Fuel CMS instance
nomisec
WORKING POC
by Cyberuser-hash · remote
https://github.com/Cyberuser-hash/CVE-2018-16763
This PoC exploits CVE-2018-16763, a command injection vulnerability in Fuel CMS, by sending a crafted HTTP request to execute a reverse shell via netcat. The payload is URL-encoded and targets the 'filter' parameter in the Fuel CMS pages module.
Classification
Working Poc 90%
Target:
Fuel CMS 1.4.1
No auth needed
Prerequisites:
Network access to the target Fuel CMS instance · Netcat listener set up on the attacker's machine
nomisec
WORKING POC
by bad-c0de · poc
https://github.com/bad-c0de/CVE-2018-16763_FuelCMS-1.4.1_RCE
This repository contains a functional Python exploit for CVE-2018-16763, which leverages PHP code evaluation in FuelCMS 1.4.1 via the 'filter' parameter to achieve pre-authentication remote code execution. The exploit supports both web shell and reverse shell functionalities.
Classification
Working Poc 95%
Target:
FuelCMS 1.4.1
No auth needed
Prerequisites:
Target URL · Attacker IP (for reverse shell) · Listener port (for reverse shell)
nomisec
WORKING POC
by B7T3 · poc
https://github.com/B7T3/CVE-2018-16763_FuelCMS-1.4.1_RCE
This repository contains a functional exploit for CVE-2018-16763, targeting FuelCMS 1.4.1. The exploit leverages PHP code evaluation via the 'filter' parameter to achieve pre-authentication remote code execution (RCE).
Classification
Working Poc 100%
Target:
FuelCMS 1.4.1
No auth needed
Prerequisites:
Target running FuelCMS 1.4.1 · Network access to the target
nomisec
WRITEUP
by ArtemCyberLab · poc
https://github.com/ArtemCyberLab/Project-Exploiting-a-Vulnerability-in-Fuel-CMS-CVE-2018-16763-
This is a writeup documenting the exploitation of CVE-2018-16763 in Fuel CMS 1.4, detailing the steps to achieve RCE via a reverse shell. It references a Python exploit from GitHub and uses Netcat for shell capture.
Classification
Writeup 100%
Target:
Fuel CMS 1.4
No auth needed
Prerequisites:
Target running Fuel CMS 1.4 · Network access to the target · Python exploit script · Netcat for reverse shell listener
nomisec
WORKING POC
by saccles · remote
https://github.com/saccles/CVE_2018_16763_Proof_of_Concept
This Python script exploits CVE-2018-16763, a pre-authenticated remote code execution vulnerability in Fuel CMS 1.4.1. It leverages PHP code evaluation via the pages/select/filter parameter to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Fuel CMS 1.4.1
No auth needed
Prerequisites:
Target running Fuel CMS 1.4.1 · Network access to the target
nomisec
WORKING POC
by altsun · remote
https://github.com/altsun/CVE-2018-16763-FuelCMS-1.4.1-RCE
This is a Python-based exploit for CVE-2018-16763, targeting Fuel CMS 1.4.1. It leverages a remote code execution vulnerability via a crafted URL with a payload injected into the 'filter' parameter.
Classification
Working Poc 95%
Target:
Fuel CMS <= 1.4.1
No auth needed
Prerequisites:
Target running Fuel CMS <= 1.4.1 · Network access to the target
nomisec
WORKING POC
by VitoBonetti · remote
https://github.com/VitoBonetti/CVE-2018-16763
This is a Python 3.x exploit for CVE-2018-16763, targeting Fuel CMS 1.4.1. It leverages a remote code execution vulnerability via a crafted URL with a malicious filter parameter to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Fuel CMS <= 1.4.1
No auth needed
Prerequisites:
Target system running Fuel CMS <= 1.4.1 · Network access to the target system
nomisec
STUB
by antisecc · poc
https://github.com/antisecc/CVE-2018-16763
The repository contains only a README.md file with the CVE identifier and no exploit code or technical details. It appears to be a placeholder or stub.
Target:
unknown
No auth needed
nomisec
WORKING POC
by BrunoPincho · poc
https://github.com/BrunoPincho/cve-2018-16763-rust
This Rust-based exploit targets CVE-2018-16763, a command injection vulnerability in Fuel CMS. It authenticates with provided credentials and executes arbitrary commands via a crafted URL parameter.
Classification
Working Poc 90%
Target:
Fuel CMS 1.4.1
Auth required
Prerequisites:
Valid Fuel CMS credentials · Network access to the target
nomisec
WORKING POC
by wizardy0ga · remote
https://github.com/wizardy0ga/THM-Vulnerability_Capstone-CVE-2018-16763
This repository contains a Python-based exploit for CVE-2018-16763, a remote code execution vulnerability in Fuel CMS 1.4.1. The exploit leverages a command injection flaw via a crafted GET request to `/fuel/pages/select/` with a malicious filter parameter.
Classification
Working Poc 95%
Target:
Fuel CMS 1.4.1
No auth needed
Prerequisites:
Target must be running Fuel CMS 1.4.1 · Network access to the target web server
nomisec
WORKING POC
by uwueviee · poc
https://github.com/uwueviee/Fu3l-F1lt3r
This is a Rust implementation of an exploit for CVE-2018-16763, a command injection vulnerability in Fuel CMS. It provides both a live shell and the ability to download and execute a malicious file on the target system.
Classification
Working Poc 95%
Target:
Fuel CMS (version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Fuel CMS · Network access to the target
vulncheck_xdb
WORKING POC
remote
https://github.com/1337kid/Exploits
The repository contains functional exploit scripts for multiple CVEs, including CVE-2018-16763, which demonstrates a remote code execution (RCE) vulnerability in FuelCMS v1.4.1. The script leverages a PHP code injection flaw to download and execute a malicious payload.
Classification
Working Poc 95%
Target:
FuelCMS v1.4.1
No auth needed
Prerequisites:
target URL
vulncheck_xdb
WORKING POC
remote
https://github.com/n3rdh4x0r/CVE-2018-16763
The repository contains a functional Python3 exploit for CVE-2018-16763, targeting Fuel CMS 1.4.1. The exploit leverages a command injection vulnerability via a crafted HTTP request to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Fuel CMS 1.4.1
No auth needed
Prerequisites:
Target URL must be specified in the script · Target must be running Fuel CMS 1.4.1